Which failover policy will allow a primary Data Mover to fail without causing a standby to take over?
A. Auto
B. Manual
C. Offline
D. Passive
If a customer wants to use a Celerra Data Mover as a FTP server, what steps must be taken to enable that service?
A. Edit and save the netd file; no reboot required
B. Edit and save the param file and reboot
C. None, the service runs by default
D. Use the server_param command; no reboot required
For a CIFS server configuration on a Virtual Data Mover, what is saved with the VDM configuration but NOT saved on the physical Data Mover?
A. CAVA
B. CDMS
C. Homedir
D. Usermapper
A network administrator must stop all ICMP traffic to the network. Which methods can be used?
A. Deny ICMP at a router
B. Block ICMP at a switch
C. Block the port on a firewall
D. Enable VLAN ports at the switch
E. A and B
F. A and C
G. B. and C
H. C. and D
Where would you define settings and options to enable each Data Mover to utilize virus checking?
A. Celerra Management Snap-in
B. Data Mover param file
C. Third-party AV engine
D. VC. client
In 5.5 code, how many checkpoints can SnapSure maintain?
A. 32
B. 64
C. 96
D. 128
What are the SavVol configuration settings when implementing Replicator V2?
A. If PFS > 20 GB, then SavVol = 20 GB
B. If PFS < 20 GB then SavVol = 20 GB
C. If PFS >= 64 MB, then SavVol >= 64 MB
D. If PFS <= 64 MB, then SavVol >= PFS size
The Celerra backup-to-disk (B2D) feature offers what benefit compared to tape-based backup operations?
A. Quick restores of individual files
B. Scalability to larger numbers of clients
C. Archival backups to comply with regulatory policies
D. Utilizes metadata to the backup server to limit network traffic
A site administrator would like to have file system quota implemented. However, the administrator is worried about users who create symbolic links.
How can symbolic links be excluded from the file system quota?
A. Use the filesize policy
B. Use the block policy
C. Use group and user quotas together
D. Use the excl option when configuring the quota
Which iSCSI objects require secret passwords for two-way CHAP authentication?
A. Agent and protocol server
B. Client and target
C. Target and initiator
D. Target and source